Cyber Posture

CVE-2025-67030

High

Published: 25 March 2026

Published
25 March 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0027 50.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Directory Traversal vulnerability in the extractFile method of org.codehaus.plexus.util.Expand in plexus-utils before 6d780b3378829318ba5c2d29547e0012d5b29642. This allows an attacker to execute arbitrary code

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of the vulnerable plexus-utils library to the fixing commit, eliminating the directory traversal vulnerability.

prevent

Requires validation of inputs to the extractFile method to block malicious path traversal attempts leading to arbitrary code execution.

detect

Enables vulnerability scanning to identify and prioritize the plexus-utils directory traversal flaw for remediation.

Security SummaryAI

CVE-2025-67030 is a directory traversal vulnerability (CWE-22) in the extractFile method of the org.codehaus.plexus.util.Expand class within the plexus-utils library, affecting versions prior to the commit 6d780b3378829318ba5c2d29547e0012d5b29642. Published on 2026-03-25, this flaw carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

An unauthenticated attacker accessible over the network can exploit this vulnerability with low complexity, though it requires user interaction. Successful exploitation enables arbitrary code execution on the target system, compromising confidentiality, integrity, and availability with high impact.

Mitigation involves updating plexus-utils to the fixing commit 6d780b3378829318ba5c2d29547e0012d5b29642 or later, as detailed in the project's GitHub repository. Related discussions and pull requests, including issue #294 and pulls #295 and #296, provide further context on the patch and resolution.

Details

CWE(s)

Affected Products

codehaus-plexus
plexus-utils
≤ 3.6.1 · 4.0.0 — 4.0.3

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Directory traversal in archive extraction enables arbitrary code execution via crafted malicious files processed by vulnerable applications, directly facilitating Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References